Forem

# phishing

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Starkiller Phishing: How MFA-Bypass Reverse-Proxies Became a Service

Starkiller Phishing: How MFA-Bypass Reverse-Proxies Became a Service

Comments
6 min read
Ethical Phishing Simulations: Balancing Security Training and Legal Compliance in Authorized Environments

Ethical Phishing Simulations: Balancing Security Training and Legal Compliance in Authorized Environments

Comments
12 min read
AitM Phishing 2026: How Starkiller and Tycoon 2FA Bypass Your MFA

AitM Phishing 2026: How Starkiller and Tycoon 2FA Bypass Your MFA

Comments
5 min read
Advanced Cybersecurity: How Attackers Break In and How to Stop Them
Cover image for Advanced Cybersecurity: How Attackers Break In and How to Stop Them

Advanced Cybersecurity: How Attackers Break In and How to Stop Them

Comments
12 min read
VoicePress5: Tracing a Phishing-to-Java RAT Infection Chain

VoicePress5: Tracing a Phishing-to-Java RAT Infection Chain

Comments
10 min read
Phishing Campaign Exploits Google Cloud Storage Domain: Redirects to Credential Harvesting Sites

Phishing Campaign Exploits Google Cloud Storage Domain: Redirects to Credential Harvesting Sites

Comments
8 min read
Fake Google Security Alert Installs PWA That Steals MFA Codes

Fake Google Security Alert Installs PWA That Steals MFA Codes

Comments
4 min read
Fuck Around and Find Out: How a $6.99 Phishing Scam Got 1.2 Million Fake Victims
Cover image for Fuck Around and Find Out: How a $6.99 Phishing Scam Got 1.2 Million Fake Victims

Fuck Around and Find Out: How a $6.99 Phishing Scam Got 1.2 Million Fake Victims

5
Comments
7 min read
🔐 Why SPF, DKIM & DMARC Are Essential for Email Security
Cover image for 🔐 Why SPF, DKIM & DMARC Are Essential for Email Security

🔐 Why SPF, DKIM & DMARC Are Essential for Email Security

1
Comments
3 min read
Rapid Deployment of Phishing Pattern Detection with Docker Under Tight Deadlines

Rapid Deployment of Phishing Pattern Detection with Docker Under Tight Deadlines

Comments
2 min read
Your IDE is an Attack Vector

Your IDE is an Attack Vector

51
Comments 52
5 min read
I Run a Cybersecurity Website—and Still Get These Phishing Emails. Here’s How to Spot Them Instantly
Cover image for I Run a Cybersecurity Website—and Still Get These Phishing Emails. Here’s How to Spot Them Instantly

I Run a Cybersecurity Website—and Still Get These Phishing Emails. Here’s How to Spot Them Instantly

2
Comments
1 min read
🎯 Building a VS Code Phishing Simulation for Security Awareness Training - Simulation Lazarus - APT 38
Cover image for 🎯 Building a VS Code Phishing Simulation for Security Awareness Training - Simulation Lazarus - APT 38

🎯 Building a VS Code Phishing Simulation for Security Awareness Training - Simulation Lazarus - APT 38

18
Comments
11 min read
If your "Unsubscribe" link requires users to login, you're training them to fall for phishing attacks
Cover image for If your "Unsubscribe" link requires users to login, you're training them to fall for phishing attacks

If your "Unsubscribe" link requires users to login, you're training them to fall for phishing attacks

1
Comments
2 min read
👋 Sign in for the ability to sort posts by relevant, latest, or top.